This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.
☆52Mar 31, 2026Updated 2 weeks ago
Alternatives and similar repositories for Publications
Users that are interested in Publications are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- ☆47May 13, 2024Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆22Dec 1, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- Modular and extensible library for Virtual Machine Introspection☆123Apr 7, 2026Updated last week
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆52Aug 27, 2024Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆170Mar 23, 2024Updated 2 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆16May 15, 2021Updated 4 years ago
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- Userland exec PoC to be used as attack vector technique☆97Oct 23, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆84Aug 30, 2024Updated last year
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated last year
- ☆56Aug 26, 2022Updated 3 years ago
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- ☆23Feb 18, 2025Updated last year
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆25Oct 12, 2021Updated 4 years ago
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year
- Bump your ida python script automatically!☆31Apr 19, 2025Updated 11 months ago
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- ☆19Aug 22, 2023Updated 2 years ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- A simple Windows application that allows the user to pick between IDA installation for the given file.☆31Oct 11, 2025Updated 6 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Jun 17, 2022Updated 3 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exports monitoring plugin for x64dbg☆22Mar 14, 2023Updated 3 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆54Apr 1, 2026Updated 2 weeks ago
- An IDA plugin that can be used to partially synchronize IDBs between different users reversing the same binaries☆140Jan 8, 2025Updated last year
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆112Updated this week
- CodeMirror bindings for ShareDB.☆11Feb 24, 2019Updated 7 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 8 months ago